CN102223231B - M2M terminal authentication system and authentication method - Google Patents

M2M terminal authentication system and authentication method Download PDF

Info

Publication number
CN102223231B
CN102223231B CN201010151160.8A CN201010151160A CN102223231B CN 102223231 B CN102223231 B CN 102223231B CN 201010151160 A CN201010151160 A CN 201010151160A CN 102223231 B CN102223231 B CN 102223231B
Authority
CN
China
Prior art keywords
key
terminal
terminating gateway
certification
carrier network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010151160.8A
Other languages
Chinese (zh)
Other versions
CN102223231A (en
Inventor
朱允文
田甜
韦银星
高峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010151160.8A priority Critical patent/CN102223231B/en
Publication of CN102223231A publication Critical patent/CN102223231A/en
Application granted granted Critical
Publication of CN102223231B publication Critical patent/CN102223231B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

The invention discloses a kind of M2M terminal authentication system and realize the method for certification, present system have employed layering authentication mechanism, first the certification of carrier network to M2M terminating gateway is realized, certification comprises the certification to equipment and the certification to user, ensure that M2M terminating gateway is not distorted by malicious user, attack or clone; Then, realize the certification of M2M terminating gateway to M2M terminal, certification equally also comprises the certification to equipment and the certification to user, by M2M terminal authentication system of the present invention, greatly reduce the signaling traffic load that carrier network increases greatly owing to supporting M2M business, thus ensure that the service quality that M2M serves, and then ensure that communication quality.

Description

M2M terminal authentication system and authentication method
Technical field
The present invention relates to Machine To Machine (M2M) technology, particularly relate to a kind of M2M terminal authentication system and authentication method.
Background technology
Along with development and the maturation of M2M technology, the diversification of M2M purposes, the quantity of M2M terminal will have growth sharply.According to estimates, the number of terminals of M2M will reach two orders of magnitude of handheld terminal quantity.
At present, handheld terminal certification in 3GPP network is the two-way authentication based on shared key:
Mobile phone terminal side and network side all prestore shared key, each terminal needs access network, network all needs to follow the shared key of handheld terminal to generate Ciphering Key RAND ‖ XRES ‖ CK ‖ IK ‖ AUTN according to it, RAND is random number, CK is encryption key, IK is Integrity Key, AUTN is network authentication token, XRES is calculation expectation token, network is by RAND, AUTN issues terminal, terminal uses RAND, AUTN completes the certification to network, and return corresponding RES to network, network RES and expectation token XRES coupling, complete the certification to terminal, after two-way authentication, shared key CK is had between terminal and network, IK.
In 3GPP network, if each M2M terminal is also according to existing authentication mode, separately complete authentication with network and transmit data, so, to there is facing the situation that cannot process so huge user's request in 3GPP network, thus seriously reduce the service quality of M2M service, meanwhile, therefore interpersonal communication quality also can be greatly affected.
Due to the network authentication mode of current 3GPP, be difficult to the M2M terminal that after meeting, quantity is more and more huger, and, due to the significantly increase of required signaling quantity, the service quality that M2M serves can not be ensured, thus reduce communication quality.
Summary of the invention
In view of this, main purpose of the present invention is a kind of method providing M2M terminal authentication system and realize certification, significantly can reduce required signaling quantity, ensures the service quality of M2M service, thus ensures communication quality.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of M2M terminal authentication system, this system mainly comprises Machine To Machine M2M terminating gateway, M2M terminal and carrier network, wherein,
M2M terminating gateway, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with carrier network and M2M terminal respectively;
M2M terminal, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway;
Carrier network, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway.
The key K v that equipment vendor distributes is provided with, the key K o that operator distributes in described M2M terminating gateway;
Described M2M terminating gateway, specifically for carrying out two-way authentication based on key K v and key K o between carrier network.
The key K v ' that equipment vendor distributes is stored in described M2M terminal, and the key K o ' that operator distributes;
Described M2M terminal, specifically for carrying out two-way authentication with M2M terminating gateway based on the key K v ' shared and key K o '.
Described M2M terminal specifically for:
The certificate server of described carrier network is the key K v ' of M2M terminal distribution from equipment vendor request equipment business;
The key K o ' that described Kv ' and operator distribute by the certificate server of described carrier network, or f (Kv ', Ko '), send to M2M terminating gateway; Described f (Kv ', Ko ') be with the function of described Kv ' and described Ko ' as parameter;
Described M2M terminating gateway and M2M terminal, according to described Kv ' and described Ko ' or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
Communication mode between described M2M terminating gateway and M2M terminal, includes but not limited to one of following: WLAN (wireless local area network) WIFI, bluetooth, local area network (LAN).
Comprise at least one M2M terminal, the M2M terminal being connected to same M2M terminating gateway belongs to same group.
A kind of M2M terminal authentication method, comprising:
The key that M2M terminating gateway distributes according to equipment vendor and the key that operator distributes, complete mutual certification with carrier network;
The key that M2M terminal is distributed according to equipment vendor and the key that operator distributes, complete mutual certification with M2M terminating gateway.
The key K v that equipment vendor distributes is provided with in described M2M terminating gateway, and the key K o that operator distributes;
Described M2M terminating gateway and carrier network complete mutual certification and comprise:
The certificate server of described carrier network obtains the key K v of M2M terminating gateway from equipment vendor's request;
Described M2M terminating gateway sends access request via carrier network to the certificate server of carrier network;
The certificate server of described carrier network, according to the mark of the M2M terminating gateway carried in described access request, obtains key K v and the key K o of this M2M terminating gateway;
The key that described carrier network and M2M terminating gateway distribute according to equipment vendor and the key that operator distributes, carry out certification.
In M2M terminal, the key K v ' of equipment vendor's distribution and the key K o ' of operator's distribution is pre-set described;
Described M2M terminal and M2M terminating gateway complete mutual certification and comprise:
The certificate server of described carrier network is the key K v ' of M2M terminal distribution from equipment vendor request equipment business;
The key K o ' that described Kv ' and operator distribute by the certificate server of described carrier network, or f (Kv ', Ko '), send to M2M terminating gateway; Described f (Kv ', Ko ') be with the function of described Kv ' and described Ko ' as parameter;
Described M2M terminating gateway and M2M terminal, according to described Kv ' and described Ko ' or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
As can be seen from the technical scheme that the invention described above provides, present system have employed layering authentication mechanism, first the certification of carrier network to M2M terminating gateway is realized, certification comprises the certification of certification to equipment (key that equipment vendor distributes) and equipment identities (key that operator distributes), ensure that M2M terminating gateway is not distorted by malicious user, attack or clone; Then, realize the certification of M2M terminating gateway to M2M terminal, certification equally also comprises the certification of certification to M2M terminal and M2M terminal identity, by M2M terminal authentication system of the present invention, greatly reduce the signaling traffic load that carrier network increases greatly owing to supporting M2M business, thus ensure that the service quality that M2M serves, and then ensure that communication quality.
Accompanying drawing explanation
Fig. 1 is the composition structural representation of M2M terminal authentication system of the present invention;
Fig. 2 is the schematic flow sheet of the embodiment of mutual certification between M2M terminating gateway of the present invention and carrier network;
Fig. 3 is the schematic flow sheet of the embodiment of mutual certification between M2M terminal of the present invention and M2M terminating gateway.
Embodiment
Fig. 1 is the composition structural representation of M2M terminal authentication system of the present invention, as shown in Figure 1, mainly comprises M2M terminating gateway, M2M terminal and carrier network, wherein,
M2M terminating gateway, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with carrier network and M2M terminal respectively.
M2M terminal, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway.
Carrier network, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway.
Communication mode between M2M terminating gateway and M2M terminal can be, but not limited to Wireless Fidelity (WIFI, WirelessFidelity), bluetooth (Bluetooth), local area network (LAN) (LAN, LocalAreaNetwork) etc.
M2M terminating gateway can be a small-sized equipment, such as puts at home, as the home gateway of Smart Home, also can be than relatively large equipment, be placed in mine, pasture, farm.In present system, the authentication request of all M2M terminals all ends in M2M terminating gateway, and the wireless base station no longer to operator forwards, and reduces signaling consumption so to the full extent.
Mutual certification between M2M terminating gateway and carrier network comprises the certification of equipment and the certification of user, M2M terminating gateway specifically for: be wherein provided with equipment vendor distribute key K v (also referred to as device keys Kv), the key K o (also referred to as user key Ko) that operator distributes, the two-way authentication between M2M terminating gateway and carrier network realizes based on permanent general character key K v and key K o.Wherein, key K v and key K o is all stored in the trusted context of M2M terminating gateway, and namely the external world cannot know, operator can obtain key K v by other trusted channels from equipment vendor.
Like this, together with M2M terminating gateway is bundled in SIM card, the stolen or clone's M2M gateway terminal of SIM card all can not cause illegal access.
When M2M terminating gateway does not exist, be also suitable for the direct certification of network with M2M terminal with upper type.
Mutual certification between M2M terminal and M2M terminating gateway comprises the certification of user class certification and device level.M2M terminal specifically for: wherein store the key K v ' that equipment vendor distributes, and the key K o ' that operator distributes, the two-way authentication of M2M terminal and M2M terminating gateway is based on the key K v ' shared and key K o '.Wherein, key K v ' and key K o ' is stored in the trusted context of M2M terminal, and operator can obtain key K v ' from equipment vendor, and key K v ' and key K o ' is downloaded to M2M terminating gateway by operator.
Described M2M terminal is the key K v ' of M2M terminal distribution from equipment vendor request equipment business specifically for the certificate server of: described carrier network; The key K o ' that described Kv ' and operator distribute by the certificate server of described carrier network, or f (Kv ', Ko '), send to M2M terminating gateway; Described f (Kv ', Ko ') be with the function of described Kv ' and described Ko ' as parameter; Described M2M terminating gateway and M2M terminal, according to described Kv ' and described Ko ' or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
As shown in Figure 1, M2M terminal (i.e. M2M terminal 1, the M2M terminal 2 in Fig. 1 of same M2M terminating gateway is connected to ... M2M terminal i) belong to same group.M2M terminal is changed group and is referred to, M2M terminal is connected to another M2M terminating gateway, and now, the key K v ' of M2M terminal and key K o ' can download in the M2M terminating gateway be newly connected by carrier network.
As shown in Figure 1, present system have employed layering authentication mechanism, first realizes the certification of carrier network to M2M terminating gateway, and certification comprises the certification to equipment and the certification to user, ensure that M2M terminating gateway is not distorted by malicious user, attacks or clone; Then, realize the certification of M2M terminating gateway to M2M terminal, certification equally also comprises the certification to equipment and the certification to user, by M2M terminal authentication system of the present invention, greatly reduce the signaling traffic load that carrier network increases greatly owing to supporting M2M business, thus ensure that the service quality that M2M serves, and then ensure that communication quality.
Below in conjunction with embodiment, the method that present system realizes certification is described in detail.
Fig. 2 is the schematic flow sheet of the embodiment of mutual certification between M2M terminating gateway of the present invention and carrier network, as shown in Figure 2, comprises the following steps:
Step 200: pre-set the key K v of equipment vendor's distribution and the key K o of operator's distribution in M2M terminating gateway.Here, key K v and key K o needs to be stored in the dependable environment of M2M terminating gateway.
Step 201: the certificate server of carrier network asks the key K v of M2M terminating gateway to equipment vendor.In this step, the certificate server of carrier network needs to provide the mark that uniquely can identify M2M terminating gateway to equipment manufacturers, the such as equipment Serial Number etc. of M2M terminating gateway.
Step 202: equipment manufacturers return the key K v of the M2M terminating gateway of request to the certificate server of carrier network.In this step, communication between equipment manufacturers and the certificate server of carrier network needs mutual certification, and the transmission of the information between them is through the i.e. safety of encryption, specific implementation can adopt existing a lot of method, belong to the conventional techniques means of those skilled in the art, repeat no more here.
Step 203:M2M terminating gateway sends access request to carrier network, the user ID of M2M terminating gateway is carried in access request, such as international mobile subscriber identity (IMSI, InternationalMobileSubscriberIdentity) etc.
Step 204: carrier network forwards access request to certificate server.
Step 205: certificate server, according to the user ID of M2M terminating gateway, finds key K v and the key K o of this M2M terminating gateway, and generates Ciphering Key according to them.The specific implementation of this step can adopt existing mode to realize, as the authentication mode-AKA of existing 3GPP network, and emerging mode etc., the protection range be not intended to limit the present invention here.
Step 206: AKA Ciphering Key (RAND ‖ XRES ‖ CK ‖ IK ‖ AUTN) is transmitted to carrier network by certificate server.
Step 207: the key that carrier network and M2M terminating gateway distribute according to equipment vendor and equipment identities (key that operator distributes) carry out key agreement mechanisms (AKA, AuthenticationandKeyAgreement) certification.
By the flow process shown in Fig. 2, M2M terminating gateway and carrier network establish trusting relationship, and M2M terminating gateway and carrier network can be set up encrypted tunnel by this trusting relationship and protect signaling and media data.
Fig. 3 is the schematic flow sheet of the embodiment of mutual certification between M2M terminal of the present invention and M2M terminating gateway, as shown in Figure 3, comprises the following steps:
Step 300: pre-set the key K v ' of equipment vendor's distribution and the key K o ' of operator's distribution in M2M terminal, here, key K v ' and key K o ' is stored in the dependable environment of M2M terminal.
Step 301: the certificate server of carrier network asks the key K v ' of M2M terminal to equipment manufacturers.In this step, the certificate server of carrier network needs to provide the mark that uniquely can identify M2M terminal to equipment manufacturers, the such as equipment Serial Number etc. of M2M terminal.
Step 302: equipment manufacturers provide the key K v ' of the M2M terminal of request to the certificate server of carrier network.In this step, the communication between equipment manufacturers and the certificate server of carrier network needs mutual certification, and the transmission of information between them is through the i.e. safety of encryption.
Step 303: the key K o ' that the key K v ' of M2M terminal and operator distribute by the certificate server of carrier network, or f (Kv ', Ko ') send to carrier network.
In this step, and f (Kv ', Ko ') be a kind of function, this function with key K v ' and key K o ' as parameter, derive a sub-key, complete mutual certification using this sub-key as shared key, effect is equal to using key K v ' and key K o ' as shared key.Here need M2M terminal also to do the same operation, derive an identical sub-key.
Step 304: carrier network is by the key K v ' of M2M terminal and operator key Ko ', or f (Kv ', Ko ') sends to M2M terminating gateway.
Step 305:M2M terminating gateway and M2M terminal use shared key i.e. (key that equipment vendor distributes) Kv ' and (key that equipment vendor distributes) Ko ', or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention, and all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. a M2M terminal authentication system, is characterized in that, this system mainly comprises Machine To Machine M2M terminating gateway, M2M terminal and carrier network, wherein,
M2M terminating gateway, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with carrier network and M2M terminal respectively;
M2M terminal, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway;
Carrier network, for the key that the key that distributes according to equipment vendor and operator distribute, completes mutual certification with M2M terminating gateway;
Wherein, described certification comprises the certification to equipment and the certification to user.
2. M2M terminal authentication system according to claim 1, is characterized in that, is provided with the key K v that equipment vendor distributes in described M2M terminating gateway, the key K o that operator distributes;
Described M2M terminating gateway, specifically for carrying out two-way authentication based on key K v and key K o between carrier network.
3. M2M terminal authentication system according to claim 1, is characterized in that, stores the key K v ' that equipment vendor distributes in described M2M terminal, and the key K o ' that operator distributes;
Described M2M terminal, specifically for carrying out two-way authentication with M2M terminating gateway based on the key K v ' shared and key K o '.
4. M2M terminal authentication system according to claim 3, is characterized in that, described M2M terminal specifically for:
The certificate server of described carrier network is the key K v ' of M2M terminal distribution from equipment vendor request equipment business;
The key K o ' that described Kv ' and operator distribute by the certificate server of described carrier network, or f (Kv ', Ko '), send to M2M terminating gateway; Described f (Kv ', Ko ') be with the function of described Kv ' and described Ko ' as parameter;
Described M2M terminating gateway and M2M terminal, according to described Kv ' and described Ko ' or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
5. the M2M terminal authentication system according to any one of Claims 1 to 4, is characterized in that, the communication mode between described M2M terminating gateway and M2M terminal, includes but not limited to one of following: WLAN (wireless local area network) WIFI, bluetooth, local area network (LAN).
6. M2M terminal authentication system according to claim 5, is characterized in that, comprises at least one M2M terminal, and the M2M terminal being connected to same M2M terminating gateway belongs to same group.
7. a M2M terminal authentication method, is characterized in that, comprising:
The key that M2M terminating gateway distributes according to equipment vendor and the key that operator distributes, complete mutual certification with carrier network;
The key that M2M terminal is distributed according to equipment vendor and the key that operator distributes, complete mutual certification with M2M terminating gateway;
Wherein, described certification comprises the certification to equipment and the certification to user.
8. method according to claim 7, is characterized in that, is provided with the key K v that equipment vendor distributes in described M2M terminating gateway, and the key K o that operator distributes;
Described M2M terminating gateway and carrier network complete mutual certification and comprise:
The certificate server of described carrier network obtains the key K v of M2M terminating gateway from equipment vendor's request;
Described M2M terminating gateway sends access request via carrier network to the certificate server of carrier network;
The certificate server of described carrier network, according to the mark of the M2M terminating gateway carried in described access request, obtains key K v and the key K o of this M2M terminating gateway;
The key that described carrier network and M2M terminating gateway distribute according to equipment vendor and the key that operator distributes, carry out certification.
9. method according to claim 7, is characterized in that, pre-sets the key K v ' of equipment vendor's distribution and the key K o ' of operator's distribution described in M2M terminal;
Described M2M terminal and M2M terminating gateway complete mutual certification and comprise:
The certificate server of described carrier network is the key K v ' of M2M terminal distribution from equipment vendor request equipment business;
The key K o ' that described Kv ' and operator distribute by the certificate server of described carrier network, or f (Kv ', Ko '), send to M2M terminating gateway; Described f (Kv ', Ko ') be with the function of described Kv ' and described Ko ' as parameter;
Described M2M terminating gateway and M2M terminal, according to described Kv ' and described Ko ' or f (Kv ', Ko '), realize the two-way authentication between M2M terminal and M2M terminating gateway.
CN201010151160.8A 2010-04-16 2010-04-16 M2M terminal authentication system and authentication method Active CN102223231B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010151160.8A CN102223231B (en) 2010-04-16 2010-04-16 M2M terminal authentication system and authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010151160.8A CN102223231B (en) 2010-04-16 2010-04-16 M2M terminal authentication system and authentication method

Publications (2)

Publication Number Publication Date
CN102223231A CN102223231A (en) 2011-10-19
CN102223231B true CN102223231B (en) 2016-03-30

Family

ID=44779664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010151160.8A Active CN102223231B (en) 2010-04-16 2010-04-16 M2M terminal authentication system and authentication method

Country Status (1)

Country Link
CN (1) CN102223231B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152733A (en) * 2011-12-07 2013-06-12 华为技术有限公司 Communication method and device
ES2728660T3 (en) * 2012-02-07 2019-10-28 Bundesdruckerei Gmbh Procedure for customizing a smart meter or smart meter link gate security module
CN103685210B (en) * 2012-09-26 2018-02-13 中兴通讯股份有限公司 The register method and device of terminal
CN103796343B (en) * 2012-10-30 2018-01-02 中兴通讯股份有限公司 M2M gateway devices and its application process
JP6420352B2 (en) * 2014-02-10 2018-11-07 ゼットティーイー コーポレーションZte Corporation Triggering different devices in machine-to-machine communication systems
SG10201503071UA (en) 2015-04-20 2016-11-29 Huawei Internat Pte Ltd Method for aggregate authentication protocol in m2m communication
CN105187398B (en) * 2015-08-12 2018-01-30 四川神琥科技有限公司 A kind of authentication recognition methods
CN107820283B (en) 2016-09-13 2021-04-09 华为技术有限公司 Network switching protection method, related equipment and system
CN107820234B (en) 2016-09-14 2021-02-23 华为技术有限公司 Network roaming protection method, related equipment and system
EP4120793A4 (en) * 2020-04-08 2023-08-30 Huawei Technologies Co., Ltd. Bluetooth networking method for electronic device, and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1239362A (en) * 1998-02-25 1999-12-22 松下电器产业株式会社 Machine identifying and encrypting communicating system
CN1345514A (en) * 1999-03-26 2002-04-17 摩托罗拉公司 Secure wireless electronic-commerce system with wireless network domain
CN101345723A (en) * 2007-07-11 2009-01-14 华为技术有限公司 Management authentication method and system of client gateway

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1239362A (en) * 1998-02-25 1999-12-22 松下电器产业株式会社 Machine identifying and encrypting communicating system
CN1345514A (en) * 1999-03-26 2002-04-17 摩托罗拉公司 Secure wireless electronic-commerce system with wireless network domain
CN101345723A (en) * 2007-07-11 2009-01-14 华为技术有限公司 Management authentication method and system of client gateway

Also Published As

Publication number Publication date
CN102223231A (en) 2011-10-19

Similar Documents

Publication Publication Date Title
CN102223231B (en) M2M terminal authentication system and authentication method
CN104871579B (en) The method and apparatus of group communication safety management in mobile communication system
US10003965B2 (en) Subscriber profile transfer method, subscriber profile transfer system, and user equipment
CN101406021B (en) SIM based authentication
US20160135041A1 (en) Wi-fi privacy in a wireless station using media access control address randomization
CN102823282B (en) Key authentication method for binary CDMA
CN108781366A (en) Authentication mechanism for 5g technologies
CN104285422A (en) Secure communications for computing devices utilizing proximity services
CN102469458B (en) Group authentication method in a kind of M2M communication and system
CN102238484B (en) Based on the authentication method of group and system in the communication system of Machine To Machine
CN103609154B (en) A kind of WLAN access authentication method, equipment and system
CN101006739A (en) Reuse of identity data from an identity module in a user equipment by a peripheral device
KR20110135955A (en) Secure remote subscription management
US20150229620A1 (en) Key management in machine type communication system
CN102480727A (en) Group authentication method and system in machine-to-machine (M2M) communication
CN103533539A (en) Virtual SIM (subscriber identity module) card parameter management method and device
CN102333309B (en) Method, equipment system for key transmission in wireless local area network
CN104380773A (en) A virtual card download method, a terminal and intermediate equipment
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN102457844A (en) Method and system for managing group key in M2M (machine-to-machine) group authentication
Zhang et al. Dynamic group based authentication protocol for machine type communications
CN101635924A (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN103179559A (en) Safe communication method, device and system of terminal with low cost
CN104602208B (en) A kind of SMS encryption communication means based on mobile network
CN101715190B (en) System and method for realizing authentication of terminal and server in WLAN (Wireless Local Area Network)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant